{"id":"https://openalex.org/W2060117278","doi":"https://doi.org/10.4018/jdst.2012070102","title":"Evaluation of Encryption Procedure for User Attestation System Using a Cellular Phone","display_name":"Evaluation of Encryption Procedure for User Attestation System Using a Cellular Phone","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W2060117278","doi":"https://doi.org/10.4018/jdst.2012070102","mag":"2060117278"},"language":"en","primary_location":{"id":"doi:10.4018/jdst.2012070102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdst.2012070102","pdf_url":null,"source":{"id":"https://openalex.org/S126154059","display_name":"International Journal of Distributed Systems and Technologies","issn_l":"1947-3532","issn":["1947-3532","1947-3540"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Systems and Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101020702","display_name":"Noriyasu Yamamoto","orcid":null},"institutions":[{"id":"https://openalex.org/I100722782","display_name":"Fukuoka Institute of Technology","ror":"https://ror.org/00bmxak18","country_code":"JP","type":"education","lineage":["https://openalex.org/I100722782"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Noriyasu Yamamoto","raw_affiliation_strings":["Fukuoka Institute of Technology, Japan","Fukuoka Institute of Technology (Japan)"],"affiliations":[{"raw_affiliation_string":"Fukuoka Institute of Technology, Japan","institution_ids":["https://openalex.org/I100722782"]},{"raw_affiliation_string":"Fukuoka Institute of Technology (Japan)","institution_ids":["https://openalex.org/I100722782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113819772","display_name":"Toshihiko Wakahara","orcid":null},"institutions":[{"id":"https://openalex.org/I100722782","display_name":"Fukuoka Institute of Technology","ror":"https://ror.org/00bmxak18","country_code":"JP","type":"education","lineage":["https://openalex.org/I100722782"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Toshihiko Wakahara","raw_affiliation_strings":["Fukuoka Institute of Technology, Japan","Fukuoka Institute of Technology (Japan)"],"affiliations":[{"raw_affiliation_string":"Fukuoka Institute of Technology, Japan","institution_ids":["https://openalex.org/I100722782"]},{"raw_affiliation_string":"Fukuoka Institute of Technology (Japan)","institution_ids":["https://openalex.org/I100722782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101020702"],"corresponding_institution_ids":["https://openalex.org/I100722782"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16914591,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3","issue":"3","first_page":"15","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8963146209716797},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7024592757225037},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5810813903808594},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.5489710569381714},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5470014214515686},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.47145089507102966},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.47076416015625},{"id":"https://openalex.org/keywords/digital-camera","display_name":"Digital camera","score":0.4554133713245392},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.44642823934555054},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.35039275884628296},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3366953730583191},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.2822931706905365},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2776540517807007},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15812823176383972}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8963146209716797},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7024592757225037},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5810813903808594},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.5489710569381714},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5470014214515686},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.47145089507102966},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.47076416015625},{"id":"https://openalex.org/C2779705975","wikidata":"https://www.wikidata.org/wiki/Q62927","display_name":"Digital camera","level":2,"score":0.4554133713245392},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.44642823934555054},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.35039275884628296},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3366953730583191},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2822931706905365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2776540517807007},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15812823176383972},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jdst.2012070102","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jdst.2012070102","pdf_url":null,"source":{"id":"https://openalex.org/S126154059","display_name":"International Journal of Distributed Systems and Technologies","issn_l":"1947-3532","issn":["1947-3532","1947-3540"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Systems and Technologies","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jdst00:v:3:y:2012:i:3:p:15-26","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jdst.2012070102","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2027374956","https://openalex.org/W2043623355","https://openalex.org/W2100949244","https://openalex.org/W2104873466","https://openalex.org/W2118412524","https://openalex.org/W2125387177","https://openalex.org/W2140672968","https://openalex.org/W2153188456","https://openalex.org/W2157197975","https://openalex.org/W2589839304","https://openalex.org/W2603391096","https://openalex.org/W2921764932"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W2370205415","https://openalex.org/W2013342653","https://openalex.org/W4387493491","https://openalex.org/W2901818815","https://openalex.org/W4289281780","https://openalex.org/W2359552542","https://openalex.org/W2904225411"],"abstract_inverted_index":{"To":[0],"provide":[1],"a":[2,13,23,58],"low-cost":[3],"and":[4,32,42,61,73],"simple":[5],"user":[6],"attestation":[7,55,79],"method,":[8,80],"the":[9,19,50,67,70,74,77],"authors":[10,51],"previously":[11],"proposed":[12,78],"method":[14,27],"with":[15],"strong":[16],"authentication":[17],"using":[18,57,84],"digital":[20],"camera":[21],"of":[22,69,76],"cellular":[24,59],"phone.":[25],"This":[26],"used":[28],"2D":[29,44,62],"color":[30,45,63],"code,":[31],"as":[33],"such,":[34],"there":[35],"are":[36],"some":[37],"process":[38],"costs":[39],"like":[40],"create":[41],"decode":[43],"code.":[46,64],"In":[47],"this":[48],"paper,":[49],"present":[52],"an":[53,85],"improved":[54],"system":[56],"phone":[60],"They":[65],"compare":[66],"performance":[68],"encryption":[71],"methods":[72],"efficiency":[75],"which":[81],"is":[82],"confirmed":[83],"experimental":[86],"prototype":[87],"system.":[88]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
